IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management Reports
151 - 175 of 3066 Matches Previous Page  |  Next Page
Don't Settle for Good Enough Mobile Security: Transform Business Processes
sponsored by MobileIron
WHITE PAPER: Discover what security features your enterprise needs to consider in an EMM solution, and how to deploy one that will provide fully integrated mobile, cloud, and desktop management, protect your email on smartphones, and more.
Posted: 25 May 2017 | Published: 25 May 2017

MobileIron

Protect Against WannaCry: A Ransomware "Weapon of Mass Destruction"
sponsored by arcserve
WHITE PAPER: How can you address your WannaCry threat? Access this resource to ensure you have real-world ransomware recovery in case of disaster, circumvent ransom demands and protect your data.
Posted: 25 May 2017 | Published: 25 May 2017

arcserve

A Network Manager's Guide to Ransomware
sponsored by Cisco Umbrella
RESOURCE: In this Network Manager's Guide to Ransomware, learn how to protect your infrastructure from sophisticated, complex attacks.
Posted: 25 May 2017 | Published: 31 Jan 2017

Cisco Umbrella

Plan, Don't Panic: When Colossal DDoS Attacks Loom
sponsored by A10 Networks
WHITE PAPER: Dive deep into a rundown of recent DDoS attacks, the specific enterprise challenges they present, and how to prepare your organization's defense.
Posted: 25 May 2017 | Published: 10 Nov 2016

A10 Networks

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
RESEARCH CONTENT: With data continuing to expand there is added strain on IT teams like never before. Access this report and explore the key data protection concerns facing midsize organizations.
Posted: 25 May 2017 | Published: 25 May 2017

arcserve

Accelerate DevOps by Automating Security
sponsored by evident.io
WHITE PAPER: Discover how to use a modern cloud-native approach to security and compliance, leveraging automation and the API-centric architecture of the cloud, so DevOps teams can enjoy accelerated development cycles while reducing the risk of breaches or delays and more.
Posted: 25 May 2017 | Published: 25 May 2017

evident.io

Mobile and Cloud Security : VMware AirWatch vs. MobileIron
sponsored by MobileIron
RESOURCE: Discover a comparison between VMware AirWatch and MobileIron to see which one can provide a better MDM solution for your organization.
Posted: 25 May 2017 | Published: 25 May 2017

MobileIron

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Analyzing Ransomware and Potential Mitigation Strategies
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
Posted: 25 May 2017 | Published: 25 May 2017

CyberArk Software, Inc

MSSPs: Benefits, Challenges and Trends
sponsored by AlienVault
WHITE PAPER: Discover the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource, their security programs.
Posted: 25 May 2017 | Published: 25 May 2017

AlienVault

Improve Your Threat Intel Capabilities
sponsored by Bayshore Networks
WHITE PAPER: Learn how to deploy comprehensive threat intel protection and enablement capabilities, gaining a policy engine that automatically converts threat intel feeds into actionable policy, and more.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Ensure your DDoS Solution Works in Real-World Conditions
sponsored by A10 Networks
WHITE PAPER: Learn about the various types of DDoS attacks, challenges that are involved with detecting and mitigating these attacks, importance of validating any threat protection solution for real-world performance, and more.
Posted: 25 May 2017 | Published: 25 May 2017

A10 Networks

4 Steps to Bolstering Public Cloud Security
sponsored by evident.io
RESOURCE: Discover a modern, cloud-native security approach that will bolster your public cloud's security with automation, real-time discovery, deep insights and robust reporting.
Posted: 24 May 2017 | Published: 24 May 2017

evident.io

Extending DLP to the Cloud
sponsored by InteliSecure
WHITE PAPER: Uncover how your organization can protect its data on the cloud through the use of data loss prevention (DLP).
Posted: 24 May 2017 | Published: 24 May 2017

InteliSecure

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: This paper delves down into what DDoS attacks are and how they work. Learn about the different types of DDoS attacks and the tools, apps, and services attackers take advantage of to get past your security measures and infect your network.
Posted: 24 May 2017 | Published: 24 May 2017

A10 Networks

5 Actions for Improving Operational Technology Security in the Data Center
sponsored by Bayshore Networks
WHITE PAPER: Uncover 5 actionable recommendations that you can start following today to improve data center operational technology (OT) security.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

On the Radar: Bayshore Networks Protects the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: This Ovum report details how to get the network security you need to combat the dangers the Industrial Internet of Things presents.
Posted: 24 May 2017 | Published: 22 Feb 2016

Bayshore Networks

Choosing a Unified Mobile and Cloud Security Platform
sponsored by MobileIron
RESOURCE: Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.
Posted: 24 May 2017 | Published: 24 May 2017

MobileIron

Harnessing Analytics For Security Investigation
sponsored by Splunk
WEBCAST: Watch this video to learn how you can harness the power of analytics software to easily detect anomalies in the endpoint, so you can prevent and mitigate advanced malware such as ransom ware.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

Splunk Everywhere! Ransomware
sponsored by Splunk
WEBCAST: Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

How Data & Operational Intelligence Drive Public Sector Mission Success
sponsored by Splunk
EBOOK: Operational intelligence is the key to building a truly secure IT environment in the digital age. Use this e-book to learn about the challenges facing operational intelligence in the public sector, a system designed to help you find patterns in your data and put them into context, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

Leveraging a Security-First Approach to Compliance
sponsored by evident.io
WHITE PAPER: Learn how to meet the challenges of public cloud environments with a modern approach of a security-first model which enables continuous visibility through automation and more.
Posted: 23 May 2017 | Published: 23 May 2017

evident.io

Why Conventional MSSPs are No Longer Sufficient
sponsored by InteliSecure
EGUIDE: Learn how traditional, legacy managed security services are no longer holding up in this new era of next gen MSSPs.
Posted: 23 May 2017 | Published: 23 May 2017

InteliSecure

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.
151 - 175 of 3066 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement